Implementation and verification of high data availability on database


  • Yen-Jen Chen
  • Han Tsai Ming Chi University of Technology, Taiwan, R.O.C.



This study provides a low-cost and high-availability database management system architecture for general Small/Medium Enterprises (SMEs) to backup database data access. To prove that the proposed architecture can support the high availability of the database, and can effectively avoid data loss in memory caused by failovers, this study applies the main test method of powering off the virtual machine and verified three cases on two commonly used databases MySQL and PostgreSQL: Case 1 proves that this study combines the database native disaster recovery mechanism to effectively achieve high availability of the database. Case 2 proves that it effectively controls the WAL (Write Ahead Log) of the PostgreSQL database and Redo log mechanism of the MySQL database, so that data correctness is maintained during failovers. Case 3 proves that it can analyze and control the timing of the database in writing data in the cache memory to the hard disk. This study also designed a failover process to avoid data loss during failovers due to no enough time to write the data in the cache memory back to the hard disk; and finally to realize the high-availability of the database management system architecture in a practical way.


Keywords: Database, DBMS, High Availability, Failover, DRBD


(1) DB-Engines. (2019). The first global database ranking list in the second half of the 2018,

(2) C. Jaiswal and V. Kumar, "DbHAaaS: Database High Availability as a Service," 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, 2015, pp. 725-732.doi: 10.1109/SITIS.2015.25

(3) R. H. de Souza, P. A. Flores, M. A. R. Dantas and F. Siqueira, "Architectural recovering model for Distributed Databases: A reliability, availability and serviceability approach," 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, 2016, pp. 575-580.doi: 10.1109/ISCC.2016.7543799

(4) Adnan, A. A. Ilham and S. Usman, "Performance analysis of extract, transform, load (ETL) in apache Hadoop atop NAS storage using ISCSI," 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, 2017, pp. 1-5.doi: 10.1109/CAIPT.2017.8320716

(5) A. Elghazi, M. Berrezzouq and Z. Abdelali, "New version of iSCSI protocol to secure Cloud data storage," 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, 2016, pp. 141-145. doi: 10.1109/CloudTech.2016.7847690

(6) M. Riasetiawan, A. Ashari and I. Endrayanto, "Distributed Replicated Block Device (DRDB) implementation on cluster storage data migration," 2015 International Conference on Data and Software Engineering (ICoDSE), Yogyakarta, 2015, pp. 93-97.doi: 10.1109/ICODSE.2015.7436978

(7) Rahul k.(2018). How to Setup IP Failover with KeepAlived on Ubuntu & Debian. Retrieved from

(8) Yen-Jen Chen & An-Liang Lo. Design and implementation of construction system with high-availability application service environment, IJCEE 2015 Vol.7(6): 357-369 ISSN: 1793-8163 DOI: 10.17706/IJCEE.2015.7.6.357-369

(9) R. F. Gibadullin, I. S. Vershinin and R. S. Minyazev, "Realization of replication mechanism in PostgreSQL DBMS," 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), St. Petersburg, 2017, pp. 1-6. doi: 10.1109/ICIEAM.2017.8076380

(10) S. Ryu, K. Lee and H. Han, "In-memory write-ahead logging for mobile smart devices with NVRAM," in IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 39-46, February 2015.doi: 10.1109/TCE.2015.7064109

(11) Peter Frühwirt , Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, and Edgar Weippl, "InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs," in Seventh International Conference on Availability, Reliability and Security, 2012, doi:10.1109/ARES.2012.50

(12) Rohan McGovern.(2018). Home · rvoicilas/inotify-tools Wiki · GitHub. Retrieved from

(13) S. i. Sou and Y. b. Lin, "Modeling mobility database failure restoration using checkpoint schemes," in IEEE Transactions on Wireless Communications, vol. 6, no. 1, pp. 313-319, Jan. 2007.doi: 10.1109/TWC.2007.05200




How to Cite

Chen, Y.-J., & Tsai , H. . (2019). Implementation and verification of high data availability on database. Transactions on Networks and Communications, 7(5).